Post on 30-Nov-2015
description
transcript
RESTD
RESTD
1
ARTIFICIAL INTELLIGENCE AND REVOLUTION IN MILITARY AFFAIRS
1. Introduction . The world is presently resting on the cusp of technological
revolution. As with any promising new military technology, expectations often
exceed the eventual reality of performance, once the complexities of the
operating environment and enemy actions are brought to bear. Furthermore, the
utility of any military technology is largely dependent on its effective integration
into existing military organizations, is a way that combines it with other
capabilities and harnesses it with military aims. Artificial Intelligence (AI) is the
subject which deals with creating intelligent machines which can think and act
like humans. These high end technologies are changing the facets of modern
battlefield environments.
2. Artificial intelligence is finding new avenues in the military and numerous
applications are being developed. The induction of these technologies are
facilitating military decisions, minimizing human causalities and enhancing the
combat potential of forces. Artificial intelligence (AI) has become a field of intense
interest and high expectations within the scientific and defense technology
community. This focus of activity is well deserved as Artificial intelligence holds
the promise of dramatically changing, if not revolutionizing, the design of military
systems. This is especially true in war time environment when data availability is
high, decision periods are short, and decision efficiency and effectiveness are an
absolute necessity. Artificial intelligence in Revolution Military Affairs (RMA) are
wide and varied encompassing numerous areas including smart weapon system,
RESTD
RESTD
2
advanced communications, precision munitions, information processing and
networks, strategic planning, tactical decision making, logistic and supply
systems, battle space management, unmanned aerial platforms, training
simulators and automated security system.
3. Aim . To study evolution of Artificial Intelligence in military applications, its
existing status, future potential and impact on future warfare with special
relevance to revolution in military affairs.
4. Scope . The research will be covered in the following sequence:-
a. History/ Evolution of AI.
b. Applications of AI.
c. Military Use of AI.
d. Concept of RMA and AI.
e. RMA and Applications of AI.
f. RMA, Artificial Intelligence and Pakistan Army
g. Recommendations.
RESTD
RESTD
3
PART – I
HISTORY AND APPLICATIONS OF ARTIFICIAL INTELLIGENCE
5. History/ Evolution of Artificial Intelligence
a. Origin of AI . The origins of Artificial Intelligence usually incorporate
the theories proclaimed by several ancient Greek philosophers and
scientists. Although, arguments can be made that the Egyptians1
originally garnered that stake with the advancements they made
around 800 B.C. The 20th century produced the revolution of formal
logic with Bertrand Russell and Alfred North Whitehead’s Principia
Mathematica2. The true driving factor of AI came in the 1940’s with
the creation of the electronic computer. Advancements in computer
theory and computer science led to advancements in AI as well.
b. Present Day Status . From 1993 until the turn of the century, AI
has reached some incredible landmarks with the creation of
intelligent agents. Intelligent agents basically use their surrounding
environment to solve problems in the most efficient and effective
manner. In 1997, the first computer (named Deep Blue) beat a
world chess champion. In 1999, humanoid robots began to gain
popularity as well as the ability to walk around freely. Since then, AI
has been playing a big role in certain commercial markets and
throughout the World Wide Web. The more advanced AI projects,
1 Buchanan, Bruce G. A (Very) Brief History of Artificial Intelligence. AI Magazine 26(4): Winter 2005, 53–60. 2 Gardner, Martin. Logic Machines & Diagrams. NY: McGraw-Hill, 1958.
RESTD
RESTD
4
like fully adapting commonsense knowledge, have taken a back-
burner to more lucrative industries.
6. Applications of Artificial Intelligence . Artificial Intelligence paradigms
are used to mimic the behavior of humans in a limited way. These include tools
such as symbolic logic, Artificial Neural Networks (ANNs)3, fuzzy systems,
evolutionary computing, Intelligent Agents and probabilistic reasoning models. In
conventional programming methodologies, explicit logic and numerical
calculations are provided to solve a problem. In contrast, an ANN mimics some
biological systems by solving problems using training and learning to generalize
for new problems. Artificial Intelligence paradigms have been used successfully
to solve problems in many disciplines including business, management,
engineering design, medical diagnosis, decision making and web-based
systems.
a. Autonomous Devices . Artificial Intelligence may only get
developed to a certain level due to the threat humans feel as
computers get more and more intelligent. Robotics is one of the
facets of autonomous devices, they can be termed as Mechanical
AI. It is also a lot more complicated, since the data the robot is
receiving is real-time, real-world data, a lot more complicated that
more software-based AI programs have to deal with.
b. Expert Systems . By the early 1980's an "expert systems" industry
had emerged, and Japan and Europe dramatically increased their
funding of AI research. The field did not grow as rapidly as 3Gabriela, Prelipcean. New Ideas on the Artificial Intelligence Support in Military Applications
RESTD
RESTD
5
investors had been led to expect, and this translated into some
temporary disillusionment. Today developers can build systems
that meet the advanced information processing needs of
government and industry by choosing from a broad palette of
mature technologies. Sophisticated methods for reasoning about
uncertainty and for coping with incomplete knowledge have led to
more robust diagnostic and planning systems.
(1) Intelligent Vacuum Cleaner . An artificial intelligent vacuum
cleaner goes around the house, remembering the layout of
the house after a few trial runs. It even memorizes the areas
that tend to be dirtier.
(2) Writing an Essay . As you write your essay, the program
will automatically correct spelling according to the context of
the sentence, just like a human corrector would do. It
naturally analyzes your document for grammar errors, and
alerts you of such errors.
(3) Researching the Net . An AI-powered search engine finds
web pages given your natural language search requirements
(4) Security . The security system is linked up to a computer,
running an image recognition package. When something
crosses the field of view of the camera, the computer
analyzes and compares its results to the pictures in the
database. If it doesn't recognize the 'face' an alarm is
RESTD
RESTD
6
sounded, and the police are alerted with a picture of the
potential burglar.
c. Artificial Neural Networks . Neural Networks4 philosophy is based
on the concept of a neuron as a unit for information storage and
mapping input to output. This building block of human awareness
encompasses a few general capabilities. Basically, a biological
neuron receives inputs from other sources, combines them in some
way, performs a generally nonlinear operation on the result, and
then outputs the final result. These networks need to be capable of
an infinite number of responses. Applications of this type include
the "intelligence" behind robotic movements. Few other applications
are described in subsequent paras:-
(1) Face recognition . This includes the process in which an
image is being given as an input to the system. The process
first decides that if there is a face in the system. The neural
network identifies the area of the image where there is a
face so we go on to give that portion of the image to the data
base with which we have to match the system. The desired
profile may be given to the output.
(2) Character Recognition . Character recognition is another
area in which neural networks are providing solutions. Some
of these solutions are beyond simply academic curiosities.
4 Jonansson, Stefan. Neural Network with Military Applications, 25 October 2005.
RESTD
RESTD
7
HNC Inc., markets a neural network based product that can
recognize hand printed characters through a scanner.
(3) Image Compression . A number of studies have been done
proving that neural networks can do real-time compression
5and decompression of data. These networks can reduce
eight bits of data to three and then reverse that process
upon restructuring to eight bits again. However, they are not
lossless. Because of this losing of bits they do not favourably
compete with more traditional methods.
(4) Signal Processing . Neural networks' promise for signal
processing has resulted in a number of experiments in
various university labs. Neural networks have proven
capable of filtering out noise. Widrow's MADALINE was the
first network applied to a real-world problem. It eliminates
noise from phone lines.
(5) Financial Systems . Neural networks are making big inroads
into the financial worlds. Banking, credit card companies,
and lending institutions deal with decisions that are not clear
cut. They involve learning and statistical trends. The data
from these forms is now being used by neural networks
which have been trained on the data from past decisions.
5 A. Khashman and K.M. Curtis, "A Novel Image Recognition Technique For 3-Dimensional Objects", IEEE Int. Conf. (DSP'97), Santorini, Greece, 1997.
RESTD
RESTD
8
(6) Servo Control . Controlling complicated systems is one of
the more promising areas of neural networks. Most
conventional control systems model the operation of all the
system's processes with one set of formulas. To customize a
system for a specific process, those formulas must be
manually tuned. It is an intensive process which involves the
tweaking of parameters until a combination is found that
produces the desired results.
(7) Language Processing . Language processing encompasses
a wide variety of applications. These applications include
text-to-speech conversion, auditory input for machines,
automatic language translation, secure voice keyed locks,
automatic transcription, aids for the deaf, aids for the
physically disabled which respond to voice commands, and
natural language processing.
RESTD
RESTD
9
PART - II
7. Artificial Intelligence in the Military . The military and the science of
computers has always been incredibly closely tied - in fact, the early
development of computing was virtually exclusively limited to military purposes6.
The very first operational use of a computer was the gun director used in the
Second World War to aid ground gunners to predict the path of a plane given its
radar data. AI in the military is defined as any system which uses the help of
“intelligent” machines to complete tasks. Few application in the military are
appended below:-
a. Robotics . There is currently a large amount of research work going
in the vast fields of autonomous robotics7. These devices will be
equipped with limited processing capabilities and will thus singularly
not be able to successfully reach the end result. Thus having
multiple devices, each performing a separate function, intermediate
results can be integrated to achieve a final solution. According to a
report the US military will have approximately 30% of the Army
comprised of robotic forces by approximately 2020.
b. Surveillance Systems . Recent operations in conflict areas around
the world have made the need for accurate image processing and
fast target detection for military systems more obvious. The
computational cost is kept to a minimum through using a fast edge
detection operator combined with the power of a successfully
6 McCorduck, Pamela. Machines Who Think. San Francisco: W.H. Freeman, 1979 7 Dwarkadas J. Sanghvi. Autonomous Robotics, College Of Engineering, Vile Parle, Mumbai. 17th August, 2006
RESTD
RESTD
10
trained neural network that recognizes only one correct scale for
the entire image, out of the many available scales possible in scale
space.
c. Weapon Platforms . The future war is based on information and
knowledge resources as the main combat information warfare,
information warfare against the characteristics, combined with high-
tech precision guided weapons8 in the application of analysis of
precision-guided weapons in future wars in the direction of
development. Precision-guided weapons in the direction system,
network, intelligent, stealth technology, while also moving toward
integration, multi-purpose direction, focusing on the improvement of
cost-effective, future wars will gradually become the basic fire.
d. Simulators . There are at least three major categories of simulation
users in the military—those that are training individual combatants
or leaders and teams; those that are performing analyses of
systems, doctrine, and tactics for purposes of acquisition and
advanced development; and those that are addressing questions
associated with improving command and control and the
interoperability of joint forces.
(1) Live Simulations . Live simulations are least dependent on
accurate models of human behavior because in these
exercises, real humans operate real equipment. The
8 Wang Wang Yu. Precision-guided weapons in the information warfare of the Development Trend Analysis.
RESTD
RESTD
11
aspects that are simulated involve weapon firing and how
hits of different types of ordnance are measured and
recorded.
(2) Virtual Simulations . Virtual simulations are
characterized by real humans operating simulated
equipment in simulated environments. These simulations
use a full range of multimedia technology and computer
software to replicate weapon and system functions in real
time with a suitable level of fidelity for interactive training with
humans in the loop.
(3) Constructive Simulations . It involves simulated people
operating simulated equipment, usually not in real time.
Real people provide inputs that set limiting values on
parameters, but they are not involved in determining the
outcomes. All human behavior in the event flow comes from
models.
e. Decision Making Systems . Military decision making demands an
increasing ability to understand and structure the critical information
on the battlefield. As the military evolves into a networked force,
decision makers should select and filter information across the
battlefield in a timely and efficient manner. Human capability in
analyzing all the data is not sufficient because the modern
battlefield is characterized by dramatic movements, unexpected
RESTD
RESTD
12
evolutions, chaotic behavior and non-linear situations. The Artificial
Intelligence (AI) ingredient permits to explore a greater range of
options, enabling the staff to analyze more possible options in the
same amount of time, together with a deeper analysis of these
options.
f. Information/ Intelligence Processing Systems . The concept
of information processing systems needs to exploit the advances in
Information Technology for providing all weather surveillance,
collation and instant dissemination of this information to facilitate
increased battlefield transparency. Image interpretation for target
identification and classification. Artificial Intelligence techniques
could automate the extraction of low-level map features from
imagery. The systems are basis of concept of fusion centres.
RESTD
RESTD
13
PART - III
CONCEPT OF RMA AND ARTIFICIAL INTELLIGENCE
Revolution in Military Affairs (RMA)
8. RMA is defined as “A major change in the nature of warfare, brought
about by innovative application of new technologies which, combined with
changes in military doctrine and operational/organizational concepts,
fundamentally alters the character and conduct of military operations.”9 The
concept is defined in the USA Department of Defence’s Annual Report to
Congress as “A Revolution in Military Affairs (RMA) occurs when a nation's
military seizes an opportunity to transform its strategy, military doctrine, training,
education, organization, equipment, operations, and tactics to achieve decisive
military results in fundamentally new ways.”10 It is combination of military
thinking of officers, military technology, military equipment, strategic theories,
force structure and the fast development of information technology11. RMA is the
product of socio-economic and technological developments. It is organic and
timely combination of advanced weapon systems, new military theoretical guide
and suitable force structure12. The application of new technologies into significant
number of military systems combines with innovative operational concepts and
organizational adaptation in a way that fundamentally alters the character and
9 Lieutenant Colonel Muhammad Azeem Asif, “RMA – Shaping the Contours of Tomorrow’s
Warfare”, The Citadel, Vol. 3/2000, p 70-82. 10 William S. Cohen, Secretary of Defense, Annual Report to the President and the
Congress,1992. 11 Zhang Hui “The New Ideas in Study of RMA” The Journal of PLA, NDU, 1998,p.67. 12 Zhu Gaungya, ed, p.62.
RESTD
RESTD
14
conduct of a conflict13. 10. This is further substantiated by Doctor Burkhard
Theile, he says, “A Revolution in Military Affairs is triggered by two crucial
factors: the technological aspect and doctrine. The process of technology –
doctrine – operational concept – organization is long and can be seen as an
evolutionary process. The outcome may be revolutionary. Combined with a
drastic change in military doctrine, operational concepts and organization, this
alters the fundamental character of military operations.”
Forms of RMA
9. The current RMA could take one of the following forms14:-
a. Single System RMA . In this type, a single technology influences
the RMA. An example is the nuclear revolution and gunpowder
revolution.
b. Combined System RMA . In this category, a collection of military
systems is put together in new ways to achieve revolutionary
effects. The inter-war innovations of armoured warfare by the
German army, amphibious warfare by the US Marine Corps, carrier
warfare by the US Navy, and strategic bombing by the US Army Air
Forces have been characterized as "Combined System RMA."
c. Integrated System RMA . The different systems, when joined with
their accompanying operational and organizational concepts, will
become integrated systems. Evidence suggests that the revolution
unfolding today, that is to say current RMA, is neither a combined-
13 Andrew Krepinevich, “Military Strategy” Chapter 1 p.7. 14 Jeffrey McKitrick and Dale Hill, “The Revolution in Military Affairs – Battlefield of the Future”,
[Online] Available http://www.airpower.maxwell.af.mil/airchronicles/battle/chp3.html.
RESTD
RESTD
15
system nor a single-system RMA but an integrated-system RMA.
The outlook is for the rapid evolution of new technologies
eventually leading to the development of several advanced military
systems. In contrast to developments during the interwar period,
this system-of-systems approach will aim to take advantage of the
cumulative effect of employing each of the new capabilities at the
same time.
Relation of Future RMA with AI 15
10. Precision Strike . Precision strike is the ability to locate high value, time
sensitive, fixed and mobile targets, to destroy them with a high degree of
confidence, with minimized damage and no chance of enemy counter strikes.
Effect of precision strike was demonstrated in Gulf, Kosovo and Afghan Wars.
Dramatic increase in capabilities to strike, a strategic target demonstrates the
importance of this concept.
11. Information Warfare . This is the category of warfare related to
information systems, their capabilities and their effects on military organizations
and operations. It is the struggle between two or more opponents to control the
information battle space. At national level, it is a new form of strategic warfare. At
the military operational level, it may contribute to major changes in conduct of
war.
12. Dominating Manoeuvre . Manoeuvre has always been an essential
element in warfare, but RMA potentially presents the ability to conduct
15 Jeffrey McKitrick and Dale Hill, “The Revolution in Military Affairs – Battlefield of the Future”,
[Online] Available http://www.airpower.maxwell.af.mil/airchronicles/battle/chp3.html.
RESTD
RESTD
16
manoeuvre at global scale, on a much compressed time scale and with greatly
reduced forces. It can be defined as positioning of forces – integrated with
precision strike, space warfare and information war operations, to attack decisive
points, defeat the enemy’s centre of gravity and accomplish war objectives.
13. Space War . It is the exploitation of space environment to conduct full
spectrum, near real time, global military operations. It involves dominating the
space, to deny its advantages to the adversary and to use it to implement one’s
own command, control, communications, reconnaissance, air defence and
weather forecasting.
14. Full Dimensional Protection . This is necessary to retain freedom of
action in modern battlefields. It involves both active and passive protective
measures against all threat forms to remain viable; to strike at will, at enemy
sensitivities. Greater stealth and jamming technologies will contribute to this end.
15. Focussed Logistic . It means reducing the logistic load to only the
essential requirement in shortest possible time, at the fastest speed and in the
correct quantity. The concept of "focused logistics" to meet the demands of
operations will be responsive, flexible, and precise" through the fusion of
information, logistics and transportation technologies. The goal is to be able to
track and redirect assets even while enroute, and to provide support in hours or
days rather than weeks. 16
16 Mr.Lothar Ibriigger (Germany), “The Revolution in Military Affairs” (online) Available http://www.naa.be/publications/comrep/1998/ar249stc-e.html.
RESTD
RESTD
17
PART - IV
16. RMA and Applications of Artificial Intelligence
a. Robotics . Robotics is in many respects is Mechanical AI. It is used
in number of applications. The movies like Terminator, Robocop
and I Robot are few examples. These robots at present performing
duties in battle field in Iraq and Afghanistan and are likely to replace
human soldiers.
b. IED Detection, Jamming and Neutralizing . New systems are
using IMT to elevate C-IED skills beyond basic detect-locate-
destroy IED competencies and into the arena of decision-making
and other more complex skills. It’s more of the methodologies of
what is the insurgent’s mindset for doing these types of things so it
can predict that order of magnitude, or that level of prevention that
is needed in order to detect or avoid those IEDs.
c. Revolution in Military Logistics . The dynamic nature of battlefield
requires logistics to acquire a number of capabilities that it currently
does not have especially in LIC. Underlying a distribution based
system, real–time situational understanding, anticipatory and
precision logistics, seamless logistics system, and streamlined
acquisition are a wide array of advanced technologies that must be
researched, developed, applied, and acquired through AI and it
must provide predictive capability to the logistician. This is the only
RESTD
RESTD
18
way to relieve the reactive burden currently imposed upon the
logistician.
d. Airborne Warning and Control Systems (AWACS) . The use of
radar on an AI aircraft is also optimized. If they can, they will use
Range While Scan and Track While Scan where the conditions
require. If they’re launching a Semi-Active Radar Homing missile
(SARH), which requires a constant radar lock from the launching
aircraft to reach the target, the AI will wait until the last moment
before switching to Single Target Track (STT), a radar mode
sounds an alert in the targeted aircraft’s cockpit, warning of
impending attack.
e. Command and Control Systems . In essence the Command and
Control System is modeled in software so we need to understand
what it is Command and Control is the exercise of authority and
direction over available resources towards the accomplishment of
some objective. It has a number of different aspects:-
(1) Data collection and monitoring.
(2) Decision-making.
(3) Planning and scheduling.
(4) Team formation, coordination, control and communication,
all taking place in real time in highly dynamic environment.
RESTD
RESTD
19
(5) Command and Control systems provide an infrastructure for
the management of information and resources in a complex
dynamic environment.
(6) Command and Control system provides the ‘glue’ that binds
everything together.
f. RPVs/ UAVs . Unmanned aerial vehicles17 have been stars in
Operations Enduring Freedom and Iraqi Freedom. The employment
of Predators in the war against global terrorism offered lot of
different capabilities, the Predator has been used in joint-combined
operations. The integration between conventionally piloted aircraft
and UAVs "was outstanding" during the Iraq. Predator pilots would
identify a target and would drop (ordnance) on the target. UAVs
obviously have the endurance to stay in an area a lot longer than
fighter aircrafts.
g. Fusion Centers (Info Collection and Processing) . The manual
information processing system is not suitable for future conflicts for
two main reasons. Firstly, the dynamics of battlefield will demand
near real time combat intelligence which the system cannot provide
even if it is fully streamlined and it works at its peak efficiency.
Secondly, the proliferation of sensors and fluid battlefield situation
will generate enormous volume of information which will be
humanly impossible to process. It is therefore imperative to develop
a fully automated system for data processing which can receive 17 http://usmilitary.about.com/cs/weapons/a/uav.htm?rd=1
RESTD
RESTD
20
information from directly interfaced sensors, carry out target
identification and situation assessment and present to commanders
a cohesive picture of battlefield in near real time. Multi Sensor Data
Fusion (MSDF) based on AI is very critical for analyzing the
accuracy and the confirmation of the collected information. With the
emergence of AI technologies and related software, the emphasis
has gone on developing fully automated surveillance systems so
that the response time is reduced and meaningful combat
information is available in near real time. It will also facilitate the
exchange/transfer of information and data within the various sub
systems of the decision making system. Some of the automated
process carried out at the surveillance centre are :-
(1) Surveillance planning.
(2) Sensor management.
(3) Multi Sensor Data Fusion (MSDF).
(4) Target Identification.
(5) Situation Assessment.
(6) Artillery Target Intelligence.
(7) Counter Bombardment (CB) process.
(8) Enemy Artillery situation assessment.
(9) Direction of Own Arty Fire (DOOAF).
(10) Post Strike Damage Assessment (PSDA).
RESTD
RESTD
21
h. Simulators . Simulation advances will transform military planning
and training. Today, virtual reality simulations can enable soldiers
to train in high fidelity mock-ups, at substantial reduction in risk and
spending. There is a need to exploit a range of tools and products
that will enhance the Army’s capabilities in the domains of training,
development, acquisition and decision support.
i. Tactical Sensor . Possible applications of these tactical sensors
are unobtrusive micro audio bugs and video recording devices with
high capacity data storage to plant at likely meeting places of
terrorists, over ground agents and sympathizers, unattended micro
ground or air sensors which can be placed in advance and remotely
activated on required basis and micro sized energy devices which
can power unattended sensors / audio / video devices and a host of
other applications in remote areas or places which require
extremely light weight power sources like light weight man portable
radars, missiles, UAVs and other systems.
RESTD
RESTD
22
PART - IV
17. RMA, Artificial Intelligence and Pakistan Army . The apparent success
of high tech systems in the ongoing wars in Iraq and Afghanistan, are indicative
that the war is undergoing a profound transformation. Technology is
fundamentally changing the face and nature of warfare. The opportunities offered
by these new emerging technologies are boundless. There is a need to
concentrate on those technologies that are important to Pakistan Army for its
modernization requirements.
a. Target Evaluation and Weapon Assignment System (TEW A). It
is a new system developed by the collaboration of Air Defense and
CARE institute. A network of radars and associated guns on a
shared network locates a hostile aerial target and automatically a
gun is assigned to neutralize the target. Moreover this is entirely
done automatically and the commander’s are also given the update
on Laptops.
b. Intelligence, Surveillance and Reconnaissance . Pakistan Army
is in the process of establishing ISR capability. Induction/
indigenous production of UAV/RPV platforms in one step in this
direction. These are being used very effectively in war against
terrorism. These systems are being used for acquisition of
information/ intelligence about militant and their hideouts for
effective engagement.
RESTD
RESTD
23
c. Network Centric Warfare . Office Automation System being
implemented by Pakistan Army is indicative of her resolve to
become a network centric army in near future. The system is being
integrated with sensor grid and response grid, which are two
important components of the system. Recent war games and war
on western front has also witnessed integration of all available
means for battle field transparency and effective response.
d. Fusion Centers . For successful operations Fusion Centers have
been established for integration of data, thus facilitating decision
makers for timely decisions, weapon platforms for selection of
engagement means and post operation analysis. These Fusion
Centers have been established in Military Operations Directorate
and at Corps Headquarters.
e. Simulators . Simulators are being used for training of soldiers and
crew for optimum utilization of different platforms. This helps in
conservation of effort, resources and infrastructure. These are still
in embryonic stage and can be used in Pre Induction Training.
f. Anti IED Doctrine . Pakistan Army has constituted a forum to
develop a strategy to counter IED. This will not only help in
neutralizing IED in the target area but will also help in safeguarding
assets in cantonments. Artificial Intelligence can be effectively used
for comprehensive response.
RESTD
RESTD
24
PART- VI
18. Recommendations
a. War Gaming AI Based Systems . To improve decision making
skills, speed and accuracy of response of commander, war gaming
software and simulators must be procured or developed. EME and
MCS can be assigned the responsibility to carry out feasibility of
these projects. As an interim measure off the shelf system for
induction in National Defense University, Command and Staff
College and other Schools of Instructions can be considered.
b. Joint Collaboration . Field of Artificial Intelligence is new and
most of the research is done in the developed countries therefore, it
would be beneficial to jointly undertake projects. Pakistan has high
end human resource and thus can contribute significantly.
c. AI Awareness in the Army . As a first step there is a dire need
to promote understanding about massive scope of AI in real battle
field situations. Most people confuse AI with war gaming software’s
and tactical simulators in which real-time data and situation is not
considered. Officers should be introduced with this new dimension
of planning in a comprehensive manner through study periods and
demos.
d. National Artificial Intelligence Complex . To congregate
effort there is a need to establish a National Complex for
development of projects. This will help to promote understanding of
RESTD
RESTD
25
simulators, quantifying requirements of hardware, software and
technical expertise for integration of AI in present C4I System and
organize Indigenous development of AI software and simulators.
The body will coordinate with various arms and services and private
companies for indigenous development of AI applications for
battlefield planning besides conducting test/trials of domestic and
foreign AI systems and making recommendations for procurement
of AI systems.
e. Evaluation/ Test and Trials . A joint venture of Air-Defense
and ‘CARE institute’ developed an Intelligent Autonomous System
for Engagement of Aerial Targets by AD guns called ‘TEWA’ -
Target Evaluation and Weapon Assignment. It is recommended the
same system be employed and further improved upon for other
fighting arms as well. Similarly DMOS as US origin system used for
evaluation of operational plans in the Pakistan Army 2009 war
games should also be extended and used for real time situations
for Command and Staff College and National Defense University.
f. Design and Implementation. As a proof of concept the system
can be initially implemented for a tank squadron or for an infantry
company. A completely autonomous system should be developed
for a small unit based on the same concept of US BCTs (Brigade
Combat Teams) which are self sufficient infantry units that have
met great success in Iraq and Afghanistan Operations.
RESTD
RESTD
26
g. Use of Simulators for Pre Induction Training . To minimize
the human causalities and better train soldiers and crew, simulators
can be used at training centers. Virtual reality environment helps in
training in near real time situation thus helping troops in quick
reflexes.
h. Research and Development . The engineering universities can
be assigned projects in the realm of artificial intelligence. This will
help in indigenous production of these systems. This will help in self
reliance and cost effective systems.
i. Pilot System . With higher echelons the complexity of design
increases. It is therefore recommended that a bottom up approach
be used to design an indigenous system at Company or Platoon
level (Squadron level in case of Armor) as a proof of concept.
j. Promoting Indigenous Development . Nowadays powerful
computer hardware is available to everyone in almost every part of
the world at affordable prices thus facilitating indigenous dev of
hardware and software applications for military purposes. It is
therefore recommended that indigenous development of simulators
and applications for military training must be promoted through
integral military resources and private companies.
k. Human Resource Training . Technical expertise in AI field is
seriously lacking and only a handful of AI specialists are currently
serving in Army. It is therefore recommended that measures be
RESTD
RESTD
27
taken to promote the field and to educate more officers in masters
and PhD both in the field of AI, otherwise we will always be lagging
and be dependent on foreign elements for requisite development
and subsequent maintenance of the system.
RESTD
RESTD
28
Conclusion .
19. It is to be understood that in the present and future warfare, AI led
technology will play a decisive role on the battlefield. There are major in the
integration of acquired AI based technology and its development. These
challenges range from general understanding and technical expertise to financial
cost and compatibility. There are a number of different projects being worked on
right now around the world, by some of the world’s finest scientist and computer
experts striving for technological advancements in Artificial Intelligence,
development will progress with new barriers being broken between human and
machine in near future. The suitability and applicability of the said field in various
domains including military has provided enough impetus for the research in the
field of Artificial Intelligence to thrive at magnificent rate. Being a competitive
world army, we also need to evaluate and adopt to the changing scenario of
Future Battle field and that is possible only if we venture hard and deep into the
AI domain vis-à-vis practically implementing the behavioural models for
technological advancement.
RESTD
RESTD
29
BIBLIOGRAPHY
1. Clark, R. (2004) Design Document For A Guided Experiential Learning
Course. Final report on contract DAAD.
2. Rhea, John. The Next 'New Frontier' of Artificial Intelligence, Military &
Aerospace Electronics November, 2000.
3. D. Gibson, Finite State Machines - Making simple work of complex
functions, SPLat Control Pty. Ltd, 1999.
4. A. E. Collins, Evaluating the performance of AI techniques on the domain
of computer games, [www.dcs.shef.ac.uk/~u8aec/com301], 2001
5. B. Bruegge & a. H. Dutoit, Object-Oriented Software Engineering -
Conquering Complex and Changing Systems, Prentice Hall, 2000
6. A.Dix, J. Finlay, G. Abowd, R. Beale, Human-Computer Interaction 2nd
Edition, Prentice Hall, 1998
7. P.K. Winston, Artificial Intelligence, Addison-Wesley, 1993
8. Handbook of Virtual Environments for Training and Education, Vol. 3.
Westport, CT: Praeger Security International.
9. Johnson, W. L. International Conference on Artificial in Intelligence. IOS
Press, Amsterdam, 2007.
10. Kilcullen, D. (2006) Twenty-Eight Articles: Fundamentals of Company-
level Counterinsurgency,Military Review, May-June 2006, 103-108.
11. J. Kim, R.W. Hill, P. Durlach, H.C. Lane, E. Forbell, M. Core, S. Marsella,
D. Pynadeth, & J. Hart, BiLAT: A game-based environment for practicing
negotiation in a cultural context. International Journal of Artificial Intelligence in
Education (in-press).
12. Wong, L. (2004) Developing Adaptive Leaders: The Crucible Experience
of Operation Iraqi Freedom.